Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Solving the Antigravity Authentication Redirect Loop on Windows
Cover image for Solving the Antigravity Authentication Redirect Loop on Windows

Solving the Antigravity Authentication Redirect Loop on Windows

1
Comments
1 min read
Mastering Kubernetes Security: Protecting Your Cloud-Native Applications
Cover image for Mastering Kubernetes Security: Protecting Your Cloud-Native Applications

Mastering Kubernetes Security: Protecting Your Cloud-Native Applications

1
Comments
5 min read
Lovable App Exposes 18,000 Users: The Vibe Coding Security Crisis Nobody Saw Coming

Lovable App Exposes 18,000 Users: The Vibe Coding Security Crisis Nobody Saw Coming

Comments
5 min read
Is Your Email Already Compromised? How to Check in 30 Seconds
Cover image for Is Your Email Already Compromised? How to Check in 30 Seconds

Is Your Email Already Compromised? How to Check in 30 Seconds

2
Comments
2 min read
Weekly Incident - Exploitation Challenges
Cover image for Weekly Incident - Exploitation Challenges

Weekly Incident - Exploitation Challenges

Comments
1 min read
Mastering ASP.NET Core Identity — Understanding **UserManager** and **SignInManager** Like a Senior .NET Engineer (2026 Edition)

Mastering ASP.NET Core Identity — Understanding **UserManager** and **SignInManager** Like a Senior .NET Engineer (2026 Edition)

Comments
4 min read
BGEANX Exchange Analysis: The Era of Information Sharing for Crypto Assets Arrives, Compliance Thresholds Are Rising

BGEANX Exchange Analysis: The Era of Information Sharing for Crypto Assets Arrives, Compliance Thresholds Are Rising

Comments
3 min read
SQL Injection – UNION attack | PortSwigger Lab Note #3

SQL Injection – UNION attack | PortSwigger Lab Note #3

5
Comments
1 min read
How to Install Docker Rootless on SLES 15/16 (2026 Guide)

How to Install Docker Rootless on SLES 15/16 (2026 Guide)

Comments 1
12 min read
Building End-to-End Encrypted Agent Conversations with Registry Broker

Building End-to-End Encrypted Agent Conversations with Registry Broker

Comments
5 min read
Preventing Fake Signups: Registration Fraud Guide
Cover image for Preventing Fake Signups: Registration Fraud Guide

Preventing Fake Signups: Registration Fraud Guide

Comments
8 min read
A Real WebSocket Hijack Hit an AI Agent Framework. Here's What We Learned.
Cover image for A Real WebSocket Hijack Hit an AI Agent Framework. Here's What We Learned.

A Real WebSocket Hijack Hit an AI Agent Framework. Here's What We Learned.

2
Comments
4 min read
How I built tamper-proof audit logs for AI agents at 15

How I built tamper-proof audit logs for AI agents at 15

Comments
3 min read
Implementing Role-Based Access Control (RBAC) on Solana

Implementing Role-Based Access Control (RBAC) on Solana

Comments
2 min read
We built a test corpus for AI agent egress security tools

We built a test corpus for AI agent egress security tools

1
Comments 1
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.